Computer SystemSoftware Questions

advertisement
Computer SystemSoftware Questions
• Digital computers are computer are classified into four
categories what are they?
Micro Computers, Mainframe Computer and Super Computers
• PC/XT stands for:
Personal Computers Extended Technology
• PC/AT stands for:
Personal Computers Advance Technology
• MIPS is
Million Instructions per Second
• Examples of Mini computer
IBM AS/400/B60, VAX 8842, WIPROGENIUS, WIPRO
LANDMARK 860, HP9000 etc.
• In the case of micro computer speed of CPU is:
(1-10MPS)
Speed of CPU in case of mini computer
(20-50 MIPS)
• The program change that makes up the operating system
along with associated utility program change, as distinct from
an application program is:
System software
• 4GL stands for:
Fourth generation language
• The basics of Internet:
TCP/IP
• A standard protocol that that describes communication
between computers, synthesizers and musical instrument:
MIDI
• The main memories have three distinct parts, what are they?
RAM, ROM, Cache
• Language processing means:
Analysis of source program +synthesis phase
• Language processor consists of two phases. What are they?
Analysis phase and synthesis phase
• The process of recognizing the lexical component in a source
string is called:
Scanning
• There are two fundamental approaches to parsing. What are
they?
Top Down parsing and Bottom Up parsing
• MDT stands for:
Macro Definition Table
• SST stands for:
Sequencing Symbol Table
• ATP stands for:
Actual Parameter Table
• In compiler, which analyzer convert s the source program
into a sequence of atomic units called tokens?
Lexical Analyzer
• Identifiers, keywords, constants, operators, and punctuation
Symbols such as commas and parentheses are typical:
Tokens
• The name of device used for user to computer
communications, usually the display and keyboard is called:
Consol
• What is CON?
It is the abbreviation for consol
• CAE stands for:
Computer aided engineering
• CADD stands for:
Computer aided drafting and design
• The leading personal computer software company Microsoft
Corporation founded in which year?
1975 by Bill Gates & Paul Allen
• What is Microsoft’s first product?
A BASIC Interrupter for the Intel 8080 up
• Windows 3 was released in which year?
March 1990
• POSIX stands for:
Portable Operating System Interface
• PASCAL was developed by:
Niklaus Wirth
COMPUTER GENERAL QUIZ QUESTIONS
• COBOL is acronym for:
Common Business Oriented Language
• BASIC is acronym for:
Beginners All Purpose Symbolic Instruction Code
• KB, MB, GB, is respectively:
Kilo Bites Mega Bites Giga Bites
• A set of 8 bits is called:
Bite
• A set of 4 bit is called:
Nibble
• HDD and FDD are respectively:
Hard Disk Drive, Floppy Disk Drive
• Winchester drive is also called:
Hard disk Drive
• The center processing unit of a computer consist 3 units namely:
Arithmetic Logic Unit, Control Unit, Memory Unit
• A program written using binary codes is called:
Machine language
• The computer which has incorporated the characters of analog and digital
computers is:
Hybrid computers
• The medium is used by input dives light pen for graphical input is:
CRT screen
• SMPS stands for:
Switch Mode Power Supply
• UPS stands for:
Uninterrupted Power Supply
• The translator program that translates each line of the source program as it run is
called:
Interpreter
• The pictorial representation of the procedure proposed to solve a problem by a
program:
Flow chart
• ANCII stands for:
American Standard Code for Information Interchange
• ANSI stands for:
American National Standard Institute
• EBCDIC is the acronym for:
Extended Binary Coded Decimal Interchange Code
• ERP packages are:
Enterprise Resource Planning Package
• Example for ERP packages:
SAP, BAN etc..
• Write office automation package of Microsoft:
Ms Office
• The time gap during the failure of a computer system is also called
Down Time
• What is meant by ‘system analyst’?
A person who examine and defines actives, flow and problems to be solved and
system and procedures to determine hoe best the necessary operation can
accomplished
• Fetch means:
To retrieve data or instructions from storage
• UNIX was developed by:
Bell laboratory s
• What is INTERNET?
Internet is the world's largest computer network, the "network of networks".
Scattered all over the world
• When was the INTERNET Created?
It was created thirty six years ago as a project of U.S Department of Defense,
• What Internet service provider (ISP)?
It is the companies that provide INTERNET access.
• What is WWW?
It is the system based hypertext and HTTP for providing organizing and accessing
wide verity of resources that are available by the INTERNET.
• What is web page?
It is a unit of information often called a document that is available over the WWW.
• Name the protocol that allows a computer to use the TCP/IP protocol and
connected directly to the Net using a standard voice telephone line and high speed
modem:
P P P (point-to-point protocol)]
• It is a software program that acts as an interface between the user and WWW
what is it?
Web Browser
• Name two different type of Web Browser:
Text-based browser and Graphical Browser
• It collects and organizes resources that are available via the WWW, and designed
to provide a starting point for locating information. Name it:
Web Index
• It is an interactive tool that enables to locate information available via Name it:
Search Engine
• It is unique, numeric identifier used to specify a particular host computer on a
particular network, and is part of a global , standard’s scheme of identifying
machines that are connected with INTERNET Name it:
IP Address (Internet Protocol)
• It is the way of identify and locate computers connected to the INTERNET Name
it:
Domain Name
• It provides hierarchical way of identifying and locating INTERNET resources on
the WWW Name It:
Uniform Resources Locater (URL)
• A binding document signed by all users that explains the rules of INTERNET use
at an institution. Name it:
Acceptable user policy (AUP)
• What is gopher?
It is a protocol designed to search, retrieve and display documents from remote site
on the Internet
• It is an Internet search tool that has the capability of searching many databases at
one time. Name it:
Wide area information service (WAIS)
• What is FTP (file transfer protocol?)
The medium that allows transferring of files between computers on the net using an
FTP program or via Netscape
• What is E-Journal?
It is an electronics publications, typically found in academic circles
• What is NNTP?
Network News Transport Protocol-This is used to distribute network news
• Name the security feature that allows access to information on an individual basis:
Authentication
MIPS is an acronym for:
Millions of instructions per second
The duplicate copy of data/program on a separate storage medium is called:
Back up
A center processor placed on a semi-conductor chip is called as a:
Microprocessor
Who invented the modem?
AT&T Information System, USA
Which is standard internet protocol for distributing E-Mail?
SMTP (Simple Mail Transfer Protocol)
The computer generated environment is called:
Virtual
Who coined the term hypertext in 1965?
Ted Nelson
Which protocol provides basis for the net?
Internet Protocol –IP
What is a kernel module?
Answer A kernel module is a set of code that can be dynamically loaded and unloaded
into the Operating System kernel at run-time. Typically, a kernel module is used to
encode a device driver to allow the operating system to interact with a new piece of
hardware (e.g. your mouse, keyboard, robot, camera etc.).
What is CVS and what is it used for?
Answer CVS, stands for Concurrent Versions System. It is a tool (a set of programs) that
maintain a central repository that records the full history of changes to the files stored in
the repository. Typically, you would store the code you are working on for a project in a
CVS repository. By keeping the full history of changes you can keep track of your work,
and also restore (or backup) from a recent change e.g. you introduced a bug.
What is SCP and what is it used for?
Answer SCP, (Secure CoPy), is a copying program that allows you to securely copy files
between two different computers that are linked via the internet. It essentially runs a copy
program using SSH to get the secure connection.
What is dynamically stable walking, explain and give an example?
Answer Dynamically stability for a walking robot (or animal) means that at some time
during its walking cycle its center of gravity, when projected onto the ground, is not
located within the support hull of its ground contact points. In simpler english, it means
that the robot must actively balance itself to prevent falling. If it were to freeze, it would
fall over. Most wheeled robots are statically stable. Humans, and most biped robots and
humanoids, are dynamically stable meaning they must continuously control their balance
to prevent falling over.
What is grep and what is it used for?
Answer Grep is a program for searching through files for lines that match a given regular
expression. For example, if I wanted to find the name Noura in a set of text files I could
run grep with: grep Noura my_text_file1.txt text_file2.txt etc.
What is GPS? How does it work?
Answer GPS, or Global Positioning System, is a satellite-based navigation system. GPS
works via a system of satellites and receiving devices used to compute positions on the
Earth. The basis of GPS is "triangulation" from satellites. To "triangulate," a GPS
receiver measures distance using the travel time of radio signals. To measure travel time,
GPS needs very accurate timing which it achieves with some tricks. Along with distance,
you need to know exactly where the satellites are in space. High orbits and careful
monitoring are the secret. Finally you must correct for any delays the signal experiences
as it travels through the atmosphere.
What is the name of the wheel configuration/drive mechanism on the
MARS rovers? Why did NASA pick this mechanism?
Answer The current Mars rovers use a rocker-bogie suspension system which allows a
rover to safely navigate steps and obstacles twice the height of its wheels. NASA's Jet
Propulsion Laboratory patented this suspension system. The rocker-bogie suspension
joins the three wheels on each side with only two swinging joints, and it connects the
whole three-wheeled bogie to the chassis at a single point. The structure has no springs,
and the freely rotating joints flex to conform to ground contours and climb obstacles. The
rover combines independent drive and individual steering (Ackerman steering) for each
wheel.
What is an advantage and a disadvantage of using sonar? (in comparison
to other sensors)
Answer Sonar as used in robots, typically consists of sending out a pulse of sound and
listening for the echo. By calculating the time from the initial pulse to the return echo,
and knowing the speed of sound, it becomes possible to calculate the distance to the
target object. Variants on sonar include changing the frequency of the sound wave
generated, and using psuedo random pulse sequences and looking for the range that gives
the maximum likelihood response.
Advantages of sonar:



Relatively simple sensor, so low cost with easy electronics
An active sensor that gives range to nearest surface
Very good underwater, where nearly every other sensor is not good
Disadvantages:



Distance estimates can vary a lot and be quite noisy for a number of reasons:
o Speed of sound varies as a function of air pressure and temperature.
Ability of sound to travel is also a function of air humidity.
o Reflection strength depends upon the properties of the surface and the
incidence angle
o Multiple reflections are possible.
Cross-talk between multiple sensors is sometimes a problem (they hear one
another)
sensor projects in a cone so it is not a fine resolution sensor.
What was the goal of the NASA mission that sent Spirit and Opportunity
to Mars? Did it succeed?
Answer NASA's twin robot geologists, the Mars Exploration Rovers, launched toward
Mars on June 10 and July 7, 2003, in search of answers about the history of water on
Mars. They landed on Mars January 3 and January 24 PST (January 4 and January 25
UTC). The Mars Exploration Rover mission is part of NASA's Mars Exploration
Program, a long-term effort of robotic exploration of the red planet. Primary among the
mission's scientific goals is to search for and characterize a wide range of rocks and soils
that hold clues to past water activity on Mars. The spacecraft are targeted to sites on
opposite sides of Mars that appear to have been affected by liquid water in the past. The
mission was considered a success when Opportunity found new evidence of water on
Mars.
Who is the current director of the Robotics Institute and what is his/her
area of expertise?
Answer The current director of the Robotics Institute is Professor Matthew T. Mason.
Matt Mason earned his BS, MS, and PhD degrees in Computer Science and Artificial
Intelligence at MIT, finishing his PhD in 1982. Since that time he has been on the faculty
at Carnegie Mellon University, where he is presently Professor of Computer Science and
Robotics, and Director of the Robotics Institute. His research interests are in robotic
manipulation, including manufacturing automation, mobile manipulation, and robotic
origami. He is co-author of "Robot Hands and the Mechanics of Manipulation" (MIT
Press 1985), co-editor of "Robot Motion: Planning and Control" (MIT Press 1982), and
author of "Mechanics of Robotic Manipulation" (MIT Press 2001). He is a winner of the
System Development Foundation Prize, a Fellow of the AAAI, and a Fellow of the IEEE.
In Robotics, what does SLAM stand for? What is it used for?
Answer SLAM stands for Simultaneous Localization and Mapping. As indicated by the
term, it is used for getting a robot to provide a fully autonomous answer to the question
``Where am I?. It demands that the robot derive a map from its perceptions while moving
through the environment and simultaneously determine its own position in that map.
Who was the founding director of the Robotics Institute? What is his/her
most recent link to Qatar?
Answer The founding director of the Robotics Institute is Professor Raj Reddy who was
recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser
University Professor of Computer Science and Robotics.
What are particle filters and Kalman filters most commonly used for in
Robotics?
Answer Particle filters and Kalman filters are state estimation filtering techniques. Both
of these are use d alot in robotics to estimate the state of a system. For example, we could
use them to estimate the location of the robot (this is localization), or where objects are
around the robot (tracking). These are probabilistic techniques, and are very good for
handling noise, uncertainty, and all of the general limitations found in real sensors.
Essentially, instead of just keeping track of the state, the two methods estimate the
probability distribution over the state space. Kalman filters use a Gaussian noise
assumption, so they only keep track of the mean and variance of the state estimate (as
that is all you need for a gaussian). Particle filters are non-parametric and can represent
any distribution if you have enough particles. These methods are mostly used for
localization, tracking of objects, inferring the behavior of say another robot, and to
estimate when things may be broken.
What is a genetic algorithm? How does it work?
Answer Genetic algorithms are a part of evolutionary computing; a popular area of
artificial intelligence. Genetic algorithms are inspired by Darwin's theory of evolution.
Simply said, problems are solved by an evolutionary process resulting in a best (fittest)
solution (survivor) - in other words, the solution is evolved. When using a genetic
algorithm we represent a solution to a given problem as a genome (or chromosome). The
genetic algorithm then creates a population of solutions and applies genetic operators
such as mutation and crossover to evolve the solutions in order to find the best one(s).
Name a robot that Carnegie Mellon University sent to the Antarctic and a
robot we sent to the Arctic. What were the missions of these robots? Did
they succeed?
Answer Carnegie Mellon University sent the Nomad robot to the Antarctic to perform
autonomous search of meteroites, and the Hyperion robot to the Arctic to demonstrate
sun-synchronous circumnavigation (i.e. can a solar-powered robot plan and execute a
circuitious route that takes into account its energy requirements and the position of the
sun and shadows). Both robots succeeded in their missions.
The Robotics Institute has had 4 directors to date. You’ve learned about
the founding director and the current director so far. Who were the other
two directors and what were their areas of expertise?
Answer The second director of the Robotics Institute was Professor Takeo Kanade and
the third director was your own Dean Chuck Thorpe. Dr. Kanade received his Ph.D. in
Electrical Engineering from Kyoto University, Japan, in 1974. After being on the faculty
at Department of Information Science, Kyoto University, he joined Computer Science
Department and Robotics Institute in 1980. He became Associate Professor in 1982, a
Full Professor in 1985, the U. A. and Helen Whitaker Professor in 1993, and a University
Professor in 1998. He became the Director of the Robotics Institute in 1992. He served as
the founding Chairman (1989-93) of the Robotics Ph. D. Program at CMU, probably the
first of its kind in the world. Dr. Kanade has worked in multiple areas of robotics, ranging
from manipulator, sensor, computer vision, multi-media applications and autonomous
robots, with more thatn 200 papers on these topics. He has been the founding editor of
International Journal of Computer.
Charles E. “Chuck” Thorpe is the first dean of Carnegie Mellon University in Qatar, and
a member of its faculty teaching robotics and advising Ph.D. students. Previously he was
the director of Carnegie Mellon University’s Robotics Institute, where he had been a
principal research scientist and founding head of its robotics master’s program. Thorpe
holds a doctor’s degree from the School of Computer Science and is one of the
university’s first alumni to pursue a career in robotics. His advisers were Raj Reddy,
founding director of the Robotics Institute, and Hans Moravec, one of the world’s first
developers of autonomous mobile robots. In 1984, he wrote his doctoral thesis in vision
and path planning. Thorpe’s research has focused on the development of outdoor robotic
vehicles, concentrating on computer vision, sensing, planning and architectures for these
machines.
Explain the following Linux commands: (1) ls –a (2) chmod +x foo (3) find
. –name “*.java”
Answer The founding director of the Robotics Institute is Professor Raj Reddy who was
recently honored with an endowed professorship from Qatar: the Mozah Bint Nasser
University Professor of Computer Science and Robotics.
You learnt about “ruby” when setting up your computers recently. What
is ruby and what is it good for?
Answer Ruby is a pure object-oriented scripting language, developed by Yukihiro
Matsumoto in Japan. It was primarily designed to handle text processing and systems
management tasks. The Ruby syntax will be familiar to anyone who has written in a
scripting language such as Perl or PHP. However, unlike Perl or PHP, which require the
use of a semi-colon as a line terminator, Ruby requires no line termination. Some
developers may at first find themselves a little confused by this, but it can actually speed
up development.
What is “SourceForge” and why is it important?
Answer SourceForge is the world's largest Open Source software development web site,
hosting more than 100,000 projects and over 1,000,000 registered users with a centralized
resource for managing projects, issues, communications, and code. SourceForge has the
largest repository of Open Source code and applications available on the Internet, and
hosts more Open Source development products than any other site or network worldwide.
SourceForge provides a wide variety of services to projects they host, and to the Open
Source community.
Name a robot in each of the following categories: 1 leg, 2 legs, 4 legs, 6 legs,
8 legs
Answer A 1-legged robots: Bow-legged hopper. A 2-legged (biped) robot: SONY Qrio. A
4-legged (quadruped) robot: SONY AIBO. A 6-legged (hexapod) robot: RHex. An 8legged robot: Dante I (or Dante II).
NETWORK DEVICES:
Repeater:
Also called a regenerator, it is an electronic device that operates only at physical layer. It
receives the signal in the network before it becomes weak, regenerates the original bit
pattern and puts the refreshed copy back in to the link.
Bridges:
These operate both in the physical and data link layers of LANs of same type. They
divide a larger network in to smaller segments. They contain logic that allow them to
keep the traffic for each segment separate and thus are repeaters that relay a frame only
the side of the segment containing the intended recipent and control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different type).
They operate in the physical, data link and network layers. They contain software that
enable them to determine which of the several possible paths is the best for a particular
transmission.
Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN
and a WAN). They accept a packet formatted for one protocol and convert it to a packet
formatted for another protocol before forwarding it. They operate in all seven layers of
the OSI model.
Switches (L2)
-------It breaks collasion domain.Uses MAC address to communicate. Faster than bridges.
Router- routtes between differnet network.it take routing decision by refering routing
table and therefore it is also called as layer 3 device.
switch-switches within same subnet.it refers mac table for forwarding decions so it is
called as a layer 2 device.
All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an
item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s
computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a
computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a
database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers
instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available to everyone, is considered to
be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to
100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same
type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the
actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each special
character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the “brains― of the computer, is responsible for
processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help perform
tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computer’s hardware
devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and
different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based servers are replacing ____________ in many
businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed computers that perform complex calculations
extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access to computers and the Internet and those
without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
40. ____________ is the science revolving around the use of nanostructures to build
devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which the computer system functions and provides
a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer chips that reside inside other devices,
such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process data, such as responses to questions or clicking
an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:
51. Between PCs and Macs, the ____________ is the platform of choice for graphic
design and animation.
Answer: Mac
52. The ____________ is the program that manages the hardware of the computer
system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system
53. The type of operating system software you use depends on your computer’s
____________.
Answer: platform
54. ____________software helps you carry out tasks, such as typing a document or
creating a spreadsheet.
Answer: Application
55. ____________are the fastest and most expensive computers.
Answer: Supercomputers
56. A ____________ is approximately 1,000 bytes.
Answer: kilobyte
57. Input devices are used to provide the steps and tasks the computer needs to
process data, and these steps and tasks are called ____________.
Answer: instructions
58. A computer gathers data, processes it, outputs the data or information, and
____________ the data or information.
Answer: stores
59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
60. A string of ____________ 0s and 1s is called a byte.
Answer: eight (8)
61. The devices you use to enter data into a computer system are known as
____________ devices.
Answer: input
62. The devices on a computer system that let you see the processed information are
known as ____________ devices.
Answer: output
63. ____________ is the set of computer instructions or programs that enables the
hardware to perform different tasks.
Answer: Software
64. When you connect to the ____________, your computer is communicating with a
server at your Internet service provider (ISP).
Answer: Internet
65. ____________ are computers that excel at executing many different computer
programs at the same time.
Answer: Mainframes
66. ____________is the application of computer systems and techniques to gather
legal evidence.
Answer: Computer forensics
67. ____________ is the science that attempts to create machines that will emulate
the human thought process.
Answer: Artificial intelligence (AI)
68. Macintosh computers use the Macintosh operating system (Mac OS), whereas
PCs generally run ____________ as an operating system.
Answer: Microsoft Windows
69. A process known as ____________ tracks trends and allows retailers to respond
to consumer buying patterns.
Answer: data mining
70. Hard disk drives and CD drives are examples of ____________ devices.
Answer: storage
71. You would use ____________ software to create spreadsheets, type documents,
and edit photos.
Answer: application
72. ____________ are computers that support hundreds or thousands of users
simultaneously.
Answer: Mainframes
73. ____________ is the term given to the act of stealing someone’s identity and
ruining their credit rating.
Answer: Identity theft
74. Surgeons are using ____________ to guide robots to perform delicate surgery.
Answer: computers
75. Patient ____________ are life-sized mannequins that have a pulse and a
heartbeat and respond to procedures just like humans.
Answer: simulators
True and False
76. Currently, the performance of tasks by robots is based on preprogrammed
algorithms.
Answer: True
77. Data can be a number, a word, a picture, or a sound.
Answer: True
78. Strictly defined, a computer is a data processing device.
Answer: True
79. The discrepancy between the “haves” and “have-nots― with regard
to computer technology is commonly referred to as the digital society.
Answer: False (digital divide)
80. One of the benefits of becoming computer fluent is being a savvy computer user
and consumer and knowing how to avoid viruses, the programs that pose threats to
computer security.
Answer: True
81. Trend-spotting programs, developed for business, have been used to predict
criminal activity.
Answer: True
82. Employers do not have the right to monitor e-mail and network traffic on
employee systems used at work.
Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to the
computer.
Answer: True
84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)
85. The CPU and memory are located on a special circuit board in the system unit
called the motherboard.
Answer: True
86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True
87. The main difference between a supercomputer and a mainframe is that
supercomputers are designed to execute a few programs as quickly as possible,
whereas mainframes are designed to handle many programs running at the same
time (but at a slower pace).
Answer: True
88. Being computer fluent means that you should be able to build a computer
yourself.
Answer: False
89. Embedded computers are self-contained computer devices that have their own
programming and do not receive input.
Answer: True
90. A Web browser is a special device that is installed in your computer that allows
it to communicate with other devices on a network.
Answer: False (network adapter)
91. With a wireless network, it is easier to relocate devices.
Answer: True
92. The most common type of memory that the computer uses to process data is
ROM.
Answer: False (RAM)
Why the document you created at home displays with a different font at school?
Because you have a different printer at school than at home Because you have a different
monitor at school than at home
font you used at home is not installed on your school computer Because the version of Windows
is different
2. Which keyboard shortcut centers selected text?
Ctrl+C Alt+C There is no keyboard shortcut for this operation Ctrl+E
3. What is the default file extension for all Word documents?
TXT WRD FIL DOC
4. Which key moves your cursor from one cell to the next in a table?
Tab Shift Enter Ctrl+Enter
5. How many different documents can you have open at one time?
No more that three Only one As many as your computer memory will hold No more than your
Taskbar can display
6. In order to email a Word document from within Word:
Go to File/Send To/Mail Recipient Save the file as an email attachment Start Outlook and
attach the file while open in Word. This is an impossible operation
7. Which keystroke will take you at the beginning or the end of a long document?
Ctrl+PageUp and Ctrl+PageDown Shift+Home and Shift+End Ctrl+Home and Ctrl+End The only
way is by using the right scroll bar
8. How many margins are on a page?
Two (header and footer) Four (top, bottom, right, left) Two (landscape and Portrait) Two (top
and bottom)
9.In order to save a Word document as a web page you need to:
Put the appropriate graphics and links on the document Save the document in simple text
format Use your web browser as an editor and save as URL Save as HTML
10. A document in portrait prints:
The same characters per line with the same document in landscape More characters per line
than the same document in landscape Less characters per line than the same document in
landscape Smaller fonts in order to fit the same amount of characters per line with landscape
1. ------- is associated with web services.
a) WSDL b) WML c) web sphere d) web logic
Ans: a
2.any large single block of data stored in a database, such as a picture or sound file,
which does not include record fields, and cannot be directly searched by the database’s
search engine.
a) TABLE
b) BLOB
c) VIEW
d) SCHEME
Ans: b
3.A reserved area of the immediate access memory used to increase the running speed of
the computer program.
a) session memory
b) bubble memory
c) cache memory
d) shared memory
Ans: c
4.a small subnet that sit between a trusted internal network and an untruster external
network, such as the public internet.
a) LAN
b) MAN
c) WAN
d) DMZ
Ans: d
5.technologies that use radio waves to automatically identify people or objects,which is
very similar to the barcode identification systems,seen in retail stores everyday.
a) BLUETOOTH
b) RADAR
c) RSA SECURE ID
d) RFID
Ans: d
6.main(){
float fl = 10.5;
double dbl = 10.5
if(fl ==dbl)
printf(“UNITED WE STAND”);
else
printf(“DIVIDE AND RULE”)
}
What is the output?
a) compilation error
b) UNITED WE STAND
c) DIVIDE AND RULE
d) Linkage error.
Ans: c
7.main(){
static int ivar = 5;
printf(“%d”,ivar--);
if(ivar)
main();
}
What is the output?
a)1 2 3 4 5
b) 5 4 3 2 1
c)5
d) Compiler error:main cannot be recursive function.
Ans: b
8.main()
{
extern int iExtern;
iExtern = 20;
printf(“%d”,iExtern);
}
What is the output?
a)2
b) 20
c) compile error
d) linker error
Ans: d
9..#define clrscr() 100
main(){
clrscr();
printf(“%d\n\t”, clrscr());
}
What is the output?
a)100 b)10 c)compiler errord)linkage error
Ans: a
10.main()
{
void vpointer;
char cHar = ‘g’, *cHarpointer = “GOOGLE”;
int j = 40;
vpointer = &cHar;
printf(“%c”,*(char*)vpointer);
vpointer = &j;
printf(“%d”,*(int *)vpointer);
vpointer = cHarpointer;
printf(“%s”,(char*)vpointer +3);
}
What is the output?
a) g40GLE
b) g40GOOGLE
c) g0GLE
d) g4GOO
Ans: a
11.#define FALSE -1
#define TRUE 1
#define NULL 0
main() {
if(NULL)
puts(“NULL”);
else if(FALSE)
puts(“TRUE”);
else
puts(“FALSE”);
}
What is the output?
a) NULL
b) TRUE
c) FALSE
d)0
Ans: b
12.main() {
int i =5,j= 6, z;
printf(“%d”,i+++j);
}
What is the output?
a)13
b)12
c)11
d) Compiler error
Ans: c
13.main() {
int i ;
i = accumulator();
printf(“%d”,i);
}
accumulator(){
_AX =1000
}
What is output?
a)1
b)10
c)100
d)1000
Ans: d
14.main() {
int i =0;
while(+(+i--)!= 0)
i- = i++;
printf(“%d”,i);
}
What is the output?
a) -1
b) 0
c) 1
d) Will go in an infinite loop
Ans: a
15.main(){
int i =3;
for(; i++=0;)
printf((“%d”,i);
}
What is the output?
a) 1
b) 2
c) 1 2 3
d) Compiler error : L value required.
Ans: d
16. main(){
int i = 10, j =20;
j = i ,j?(i,j)?i :j:j;
printf(“%d%d”,i,j);
}
What is the output?
a) 20 20
b) 20 10
c) 10 20
d) 10 10
Ans: d
17.main(){
extern i;
printf(“%d\t”,i);{
int i =20;
printf(“%d\t”,i);
}
}
What is the output?
a) “Extern valueof i “ 20
b) Externvalue of i”
c) 20
d) linker Error: unresolved external symbol i
Ans: d
18.int DIMension(int array[]){
return sizeof(array/sizeof(int);}
main(){
int arr[10];
printf(“Array dimension is %d”,DIMension(arr));
}
What is output?
a) array dimension is 10
b) array dimension is 1
c) array dimension is 2
d) array dimension is 5
Ans: b
19. main(){
void swap();
int x = 45, y = 15;
swap(&x,&y);
printf(“x = %d y=%d”x,y);
}
void swap(int *a, int *b){
*a^=*b, *b^=*a, *a^ = *b;
What is the output?
a) x = 15, y =45
b) x =15, y =15
c) x =45 ,y =15
d) x =45 y = 45
Ans: a
20.main(){
int i =257;
int *iptr =&i;
printf(“%d%d”,*((char*)iptr),*((char *)iptr+1));
}
What is output?
a)1, 257
b)257 1c)0 0d)1 1
Ans: d
21.main(){
int i =300;
char *ptr = &i;
*++ptr=2;
printf(“%d”,i);
}
What is output?
a) 556
b) 300
c) 2
d) 302
Ans: a
22.#include
main(){
char *str =”yahoo”;
char *ptr =str;
char least =127;
while(*ptr++)
least = (*ptr
printf(“%d”,least);
}
What is the output?
a) 0
b)127
c) yahoo
d) y
Ans: a
23.Declare an array of M pointers to functions returing pointers to functions returing
pointers to characters.
a) (*ptr[M]()(char*(*)());
b) (char*(*)())(*ptr[M])()
c) (char*(*)(*ptr[M]())(*ptr[M]()
d) (char*(*)(char*()))(*ptr[M])();
24.void main(){
int I =10, j=2;
int *ip = &I ,*jp =&j;
int k = *ip/*jp;
printf(“%d”,k);
}
What is the output?
a) 2
b) 5
c) 10
d) compile error:unexpected end of file in comment started in line 4
Ans: d
25.main(){
char a[4] =”GOOGLE”;
printf(“%s”,a);
}
What is the output?
a) 2
b) GOOGLE
c) compile error: yoo mant initializers
d) linkage error.
Ans: c
26.For 1MB memory, the number of address lines required
a) 12
b) 16
c) 20
d) 32
Ans: 16
27.There is a circuit using 3 nand gates with 2 inputes and 1 output,f ind the output.
a) AND
b) OR
c) XOR
d) NAND
Ans: b (not sure)
28. What is done for push operation
a) SP is incremented and then the value is stored.
b) PC is incremented and then the value is stored.
c) PC is decremented and then the value is stored.
d) SP is decremented and then the value is stored.
Ans: d
29.Memory allocation of variables declared in a program is:
a) Allocated in RAM
b) Allocated in ROM
c) Allocated in stack
d) Assigned in registers.
Ans: c
30.What action is taken when the processer under execution is interrupted by TRAP in
8085MPU?
a) Processor serves the interrupt request after completing the execution of the current
instruction.
b) processer serves the interrupt request after completing the current task.
c) processor serves the interrupt immediately.
d) processor serving the interrupt request depent deprnds upon the priority of the current
task under execution.
Ans: a
31.purpose of PC (program counter)in a microprocessor is:
a) To store address of TOS(top of stack)
b) To store address of next instructions to be executed
c) count the number of instructions
d) to store the base address of the stack.
Ans: b
32.conditional results after execution of an instruction in a microprocess is stored in
a) register
b) accumulator
c) flag register
d) flag register part of PSW (program status word)
Ans: c
33.The OR gate can be converted to the NAND function by adding----gate(s)to the input
of the OR gate.
a) NOT
b) AND
c) NOR
d) XOR
Ans: a
34. In 8051 microcontroller , has a dual function.
a) port 3
b) port 2
c) port 1
d) port 0
Ans: b
35.An 8085 based microprocessor with 2MHz clock frequency,will execute the following
chunk of code with how much delay?
MVI B,38H
HAPPY: MVI C, FFH
SADDY: DCR C
JNZ SADDY
DCR B
JNC HAPPY
a) 102.3
b)114.5
c)100.5
d)120
36.In 8085 MPU what will be the status of the flag after the execution of the following
chunk of code.
MVI B,FFH
MOV A,B
CMA
HLT
a) S = 1, Z = 0, CY = 1
b) S = 0, Z = 1, CY = 0
c) S = 1, Z = 0, CY = 0
d) S = 1, Z = 1 ,CY = 1
37.A positive going pulse which is always generated when 8085 MPU begins the
machine cycle.
a) RD
b) ALE address latch enable…
c) WR
d) HOLD
Ans: b
38.when a ----- instruction of 8085 MPU is fetched , its second and third bytes are placed
in the W and Z registers.
a) JMP
b) STA
c) CALL
d) XCHG
Ans: c
39.what is defined as one subdivision of the operation performed in one clock period.
a) T- State
b) Instruction Cycle
c) Machine Cycle
d) All of the above
Ans: a
40.At the end of the following code, what is the status of the flags.
LXI B, AEC4H
MOV A,C
ADD HLT
a) S = 1, CY = 0, P = 0 , AC = 1
b) S =0 , CY = 1, P = 0,AC = 1
c) S = 0, CY = 1, P = 0 , AC = 1
d) S = 0, CY = 1, P = 1 , AC = 1
41.In 8051 micro controller what is the HEX number in the accumulator after the
execution of the following code.
MOV A,#0A5H
CLR C
RRC A
RRC A
RL A
RL A
SWAP A
a)A6
b)6A
c)95
d)A5.
Ans: a
42.The Pentium processor requires ------------ volts.
a)9 b)12 c)5 d)24
ans; c
43. The data bus on the Celeron processor is-------bits wide.
a)64 b)32 c)16 d)128. Ans: a
44.K6 processor
a) Hitachi b) toshiba c) zilog d) AMD. Ans: d
45. What is the control word for 8255 PPI,in BSR mode to set bit PC3.
a)0EH b)0FH c)07H d)06H. ans:c
46.The repeated execution of a loop of code while waiting for an event to occur is called --------.The cpu is not engaged in any real productive activity during this period,and the
process doesn’t progress towards completion.
a) dead lock b) busy waiting c) trap door d) none.
Ans: b
47. Transparent DBMS is defined as
a) A DBMS in which there are no program or user access languages. b) A DBMS which
has no cross file capabilities but is user friendly and provides user interface management.
c) A DBMS which keeps its physical structure hidden from user d) none.
Ans: c
48.Either all actions are carried out or none are. users should not have to worry about the
effect of incomplete transctions.DBMS ensures this by undoing the actions of incomplete
transctions.this property is known as
a) Aggregation b) atomicity c) association d) data integrity.
ans : B…
49.------ algorithms determines where in available to load a program. common methods
are first fit,next fit,best fit.--------- algorithm are used when memory is full , and one
process (or part of a process) needs to be swaped out to accommodate a new program.The
------------- algorithm determines which are the partions to be swaped out.
a) placement, placement, replacement
b) replacement, placement, placement
c) replacement, placement, replacement
d) placement, replacement, replacement Ans: D
50.Trap door is a secret undocumented entry point into a program used to grant access
without normal methods of access authentication. A trap is a software interrupt,usually
the result of an error condition.
a)true b)false.
Ans: A
51. Given a binary search tree,print out the nodes of the tree according t5o post order
traversal.
4
/\
25
/\
13
a)3,2,1,5,4. b)1,2,3,4,5. c)1,3,2,5,4. d)5,3,1,2,4. Ans: C
52.which one of the following is the recursive travel technique.
a)depth first search b)preorder c)breadth first search d)none.
53.which of the following needs the requirement to be a binary search tree.
a) 5
/\
27
/
1
b) 5
/\
67
c) 5
/\
27
/\
16
d) none.
54.in recursive implementations which of the following is true for saving the state of the
steps
a) as full state on the stack
b) as reversible action on the stack
c) both a and b
d) none
55.which of the following involves context switch
a)previliged instruction
b)floating point exception
c)system calls
d)all
e)none
ans : c
56.piggy backing is a technique for
a)acknowledge
b)sequence
c)flow control
d)retransmission
ans:A
57. a functional dependency XY is ___________dependency if removal of any attribute
A from X means that the dependency does not hold any more
a)full functional
b) multi valued
c)single valued
d)none
ans : a
58)a relation schema R is in BCNF if it is in ___________and satisfies an additional
constraints that for every functional dependency XY,X must be a candidate key
a)1 NF
b)2 NF
c)3 NF
d)5 NF
59) a _________sub query can be easily identified if it contains any references to the
parent sub query columns in the _________ clause
A) correlated ,WHERE
b) nested ,SELECT
c) correlated,SELECT
d) none
60) hybrid devise that combines the features of both bridge and router is known as
a)router b)bridge c)hub d)brouter
61) which of the following is the most crucial phase of SDLC
a)testing b)code generation c) analysys and design d)implementation
Ans: c
62)to send a data packet using datagram ,connection will be established
a)no connection is required
b) connection is not established before data transmission
c)before data transmission
d)none
Ans: c
63)a software that allows a personal computer to pretend as as computer terminal is
a) terminal adapter
b)terminal emulation
c)modem
d)none
Ans: b
64) super key is
a) same as primary key
b) primary key and attribute
c) same as foreign key
d) foreign key and attribute
Ans: b
65.In binary search tree which traversal is used for ascending order values
a) Inorder b)preorder c)post order d)none
Ans: a
66.You are creating an index on ROLLNO colume in the STUDENT table.which
statement will you use?
a) CREATE INDEX roll_idx ON student, rollno;
b) CREATE INDEX roll_idx FOR student, rollno;
c) CREATE INDEX roll_idx ON student( rollno);
d) CREATE INDEX roll_idx INDEX ON student (rollno);
Ans: c
67.A________class is a class that represents a data structure that stores a number of data
objects
a. container b.component c.base d.derived
Ans: a
68.Which one of the following phases belongs to the compiler Back-end.
a. Lexical Analysis b.Syntax Analysis c. Optimization d.Intermediate Representation.
Ans: c
69.Every context _sensitive language is context_free
a. true b.false
Ans: b
70.Input:A is non-empty list of numbers L
Xß-infinity
For each item in the list L,do
If the item>x,then
Xß the item
Return X
X represents:a)largest number
b)smallest number
c)smallest negative number
d) none
71.Let A and B be nodes of a heap,such that B is a child of A. the heap must then satisfy
the following conditions
a)key(A)>=key(B)
b)key(A)
c)key(A)=key(B)
d)none
72.String ,List,Stack,queue are examples of___________
a)primitive data type
b)simple data type
c)Abstract data type
d)none
Ans: c
73.which of the following is not true for LinkedLists?
a)The simplest kind of linked list is a single linked list ,which has one link per node .this
link points to the next node in the list,or to a null value or emptylist if it is the last node.
b)a more sophisticated kind of linked list is a double linkedlist or two way linkedlist
.Each node has two links ,one to the previous node and one to the next node.
c) in a circleLinkedList ,the first and last nodes are linked together.this can be done only
for double linked list.
d) to traverse a circular linkedlist ,u begin at any node and follow the list in either
direction until u return to the original node.
Ans: c
74.sentinel node at the beginning and /or at the end of the linkedlist is not used to store
the data
a) true
b) false
Ans:a
1. Do u know abt Recursive functions?? YES. Then write a recursive function to display
Fibonacci series.
2. Fibonacci using normal loops and conditional statements.
3. Wat do u mean by scope of variables??
4. Then He gave me a program where one was a global, one was extern and so on and he
asked me the o/p.
5. Write an algorithm to add a node to a linked list using pointers:
i) at the start,
ii) at the end,
iii) in the middle.
6. Wat do u mean by Dynamic memory allocation?
7. Wat is the difference between Malloc and Calloc??
8. Syntax for malloc while initializing a node in linked list
9. How do u use malloc to initialize an array?
10.Wat is the difference between C and C++?
11. An array of numbers from 1 to 100. random selection of 99 numbers. write an efficient
algorithm to find the unselected number.
12.These and some basic questions based on strings lik strlen, strcmp, concatenating of
strings.
13. He gave me a program where an array of size 10 was initialized, a string of size 6 was
input and after concatenating another string of size6 wats the o/p?
Computers General knowledge Questions and answers
Where are files and websites on the internet stored?
Ans:The internet is a collection of a large number of client-server based systems. So all
files and other resources on it are stored on secondary storage devices of the respective
servers. Servers of websites are termed as web servers. So when you type in a URL of a
website in the address bar of your browser, it makes a connection to that web server
which in turn fetches the data from the secondary storage device (such as the hard disk)
that they must be using and returns it to the respective browser. The same holds true for
any other resource (image, MP3 file, zipped file, etc.) that you access on the internet.
2 Who invented the QWERTY keyboard?
Ans: QWERTY keyboard (also known as universal keyboard) is used in modern
computers. The name QWERTY comes from the first six letters in the top row. It was
invented by C L Sholes in 1872.
3 What is the full form of TFT in computer and mobile screens?
Ans: Thin Film Transistor (TFT) is a type of LCD flat-panel display screen. It’s called so
because each pixel is controlled by transistors. TFT technology provides the best
resolution of all the flat-panel technologies, but it is also the most expensive. TFT
displays are usually designed to run at a specific resolution.
4 What does the term ‘screen slave’ mean?
Ans: Screen slaves refers to people who are abnormally addicted to the computer. For
example, screen slaves would communicate via e-mail with people sitting right next to
them. The screen slave culture, which is particularly rampant in offices the world over, is
adding to the sedentary lifestyle of white collar workers, thereby increasing related
disorders such as obesity, heart disease and Repetitive Stress Injury.
5 What is a TFT monitor?
Ans: Thin Film Transistor (TFT) Liquid Crystal Display technology does away with the
traditional bulky Cathode Ray Tube (CRT). LCDs use a strong backlight as the light
source and control how much of this light is allowed to reach the dots (pixels) by
selectively allowing the light to reach each pixel. LCDs achieve this by taking advantage
of a key property of ‘twisted’ liquid crystal molecules; their ability to naturally block
polarised light but then let it through by degrees when a small electric field is applied.
LCD cells are accurately controlled and arranged in a flat matrix of rows and columns.
6 What is a ‘firewall’ in computer terminology?
Ans: In computer security, a firewall is a device that blocks unauthorised access to an
organisation’s local area network. A firewall can reside on the administrative computer,
the server that acts as the LAN’s gateway to the Internet. The firewall keeps track of
every file entering or leaving the local area network in order to detect the source of
viruses and other problems that might enter the network.
7 What is a handshake in computers?
Ans: Handshake is the process by which two computers initiate communication. A
handshake begins when one sends a message to another indicating that it nature of
quantum mechanics and space and time. In String Theory, all forces and particles emerge
in an elegant geometrical way, realising Einstein’s dream of building everything from the
geometry of space-time.
8 What is utility computing?
Ans: Utility computing is a service provisioning model in which a service provider makes
computing resources and infrastructure management available to the customer as needed,
and charges them for specific usage rather than a flat rate. Like other types of on-demand
computing (such as grid computing), the utility model seeks to maximise the efficient use
of resources and/ or minimise associated costs.
9 What is the difference between an inverter and a UPS?
Ans: Practically, both are same. An inverter converts DC power supply into AC supply.
A UPS (Uninterupted Power Supply) is an electronic device which uses inverter
technology in it. UPS uses AC supply when power is there, converts into DC power and
stores it. This DC power is converted back to AC supply and provides stand by power
when electricity goes off.
10 What is e-waste?
Ans: All obsolete electronic devices such as computers, servers, printers, monitors, TVs,
cellphones, calculators, CDs, floppies, chips, processors, motherboard, PCB etc. end up
as e-waste. E-waste contains many hazardous substances like PVC, plastics, heavy
metals, Brominated Flame Retardants etc.
Computer-Related Abbreviations and Acronyms.
A
A-D
Analog to Digital
AA
Author's Alteration
AA
Auto Answer
AAL5
ABEND
ATM Adaption Layer 5
Abnormal End
ABI
Application Binary Interface
ABR
Available Bit Rate
AC97
Audio Codec 97
ACB
ACDS
Access method Control Block
Active Control Data Set
ACE
Asynchronous Communications
Element
ACF
Advanced Communication Facility
ACIA
Asynchronous Communications
Interface Adapter
ACK
Acknowledge
ACS
Asynchronous Connection Server
ACS
Automatic Class Selection
ACSE
Application Control Service Element
ACT
Application Control Table
ACU
Automatic Calling Unit
ADC
Analog Digital Converter
ADDMD
Administrative Directory
Management Domain
ADMD
Administrative Management Domain
ADO
ActiveX Data Object
ADSL
Asymetric Digital Subscriber Line
AEA
Activity End Acknowledge
AEI
Application Entity Invocation
AF
Application Framework
AFP
Advanced Function Printing
AGP
Accellerated Graphics Port
AGS
AI
Advanced Graphics System
Artificial Intelligence
AIU
Application Interface Unit
AIX
Advanced Interactive eXecutive
AIX
Alternate IndeX
ALGOL
ALGOrithmic Language
ALS
Application Layer Structure
ALS
Automatic Line Switching
ALT
Application Load Table
ALU
Arithmetic and Logic Unit
AM
Access Method
AMH
Automated Material Handling
AMI
Alternate Mark Inversion
AMIS
Audio Messaging Interchange
Specification
AMR
Audio Modem Riser
AMS
Access Method Services
ANR
Automatic Network Routing
ANS
Advanced Network Services
ANSI
American National Standards
Institute
AOCE
Apple Open Collaboration
Environment
AOW
Asian and Oceanic Workshop for
open systems
AP
Access Point
AP
Automation Protocol
APA
APDU
API
APIA
APL
All Points Addressable
Application Protocol Data Unit
Application Programming Interface
API Association
A Programming Language
APPC
Advanced Program-to-Program
Communication
APPI
Advanced Peer-to-Peer
Internetwork(ing)
APPN
APS
AR
ARP
Advanced Peer-to-Peer Network(ing)
Advanced Production System
Attention Routine
Address Resolution Protocol
ARPA
Advanced Research Projects Agency
ARPANET
Advanced Research Projects
Agency Network
ARU
Audio Response Unit
AS
Activity Start
AS
Autonomous System
ASC
Accredited Standards Committee
ASCII
American Standard Code for
Information Interchange
ASE
Application Service Element
ASIC
Circuit
Application-Specific Integrated
ASN
Abstract Syntax Notation
ASN.1
Abstract Syntax Notation One
ASO
Application Service Object
ASP
Active Server Pages
ASR
Automatic Speech Recognition
ASTs
Asynchronous System Traps
AT
Advanced Technology
ATM
Adobe Type Manager
ATM
Asynchronous Transfer Mode
ATM
ATMP
ATSF
AU
AVR
AWG
Automatic Teller Machine
Ascend Tunnel Management Protocol
Alert Transport Service Facility
Access Unit
Automatic Volume Recognition
American Wire Gauge
B
B8ZS
Binary Eight Zero Substitution
BABT
British Approvals Board for
Telecommunications
BAL
Business Application Language
BAM
Basic Access Methods
BAS
Basic Activity Subset
BASH
Bourne-Again SHell
BASIC
Beginners All-Purpose Symbolic
Instruktion Code
BBS
Bulletin Board System
BCC
Block Check Character
BCD
Binary Coded Decimal
BCF
Bridge Control Facility
BCPL
Basic Combined Programming
Language
BCS
Basic Catalog Structure
BCS
Basic Combined Subset
BDAM
Basic Direct Access Method
BDR
Basic Density Range
BEL
Bell
BER
Bit Error Rate
BES
Bursty Errored Seconds
BG
BackGround
BHT
Branch History Table
BIOS
Basic Input/Output System
BIS
BISYNC
BIT
BITNIC
Business Information System
Binary Synchronous Communication
Binary Digit
Bitnet Network Information Center
BLOB
Binary Large Object
BMIC
Bus Master Interface Controller
BMP
BitMaP
BMS
Basic Mapping Support
BNN
Boundary Network Node
BOC
Bell Operating Companies
BOT
Begin Of Tape
BP
BPAM
Base Pointer
Basic Partitioned Access Method
BPI
Bytes Per Inch
BPS
Bites Per Second
BRA
Basic Rate Access
BRI
Basic Rate Interface
BS
Backspace / British Standard
BSA
BSAM
Basic Service Area
Basic Sequential Access Method
BSC
Binary Synchronous Communication
BSD
Berkeley Software Distribution
BSDS
BootStrap Data Set
BSI
British Standards Institute
BSS
Basic Synchronous Subset
BTAC
Branch Target Address Cache
BTAM
Basic Teleprocessing Access Method
BTA-ES
Basic Teleprocessing Access Method
- Extended Storage
BYP
Bypass
C
CA
Collision Avoidance
CA...
Computer Aided ...
CAA
Computer Aided Architecture
CAD
Computer Aided Design
CADD
Computer Aided Design and Drafting
CADIS
System
Computer Aided Design Interactive
CAE
Common Application Environment
CAE
Computer Assisted Education,
Computer Aided Engineering = CAD +
CAP + CAQ
CAH
Computer Aided Handling
CAI
CAO
Computer Aided Instruction = CIM +
CAISE
Computer Aided Integrated Software
Engineering
CALS
Computer Aided Acquisition and
Logistic Support
CAM
Computer Aided Manufacturing /
Content Adressable Memory
CAMAC
Control
Computer Automated MeAsurement
CAN
Cancel
CAO
Computer Aided Office
CAP
Computer Aided Planning / Computer
Aided Publishing
CAPP
Computer Aided Production Planning
CAPPC
Computer Aided Production Planning
and Control
CAPSC
Computer Aided Production
Scheduling and Control
CAQ
Computer Aided Quality Assurance
CAR
Computer Aided Roboting
CAR
Computer Assisted Radiology
CAS
Computer Aided Selling
CASE
Common Application Service
Elements
CASE
Computer Aided SoftwareEngineering
CAT
Computer Aided Testing
CATV
CAble TeleVision
CBDS
Service
Connectionless Broadband Data
CBEMA
Computer and Business Equipment
Manufacturers' Association
CBR
Constant Bit Rate
CBT
Computer Based Training
CCD
Charge-Coupled Device
CCETT
Centre Commun d'Etudes de
Telediffusion et Telecommunications
CCIR
International Radio Consultative
Committee
CCITT
Comite Consultatif International
Telegraphique et Telephonique
CCR
Committment, Concurrency and
Recovery
CCS
Common Communication Support
CCTA
Central Computer and
Telecommunications Agency
CCU
CCW
CD
Communication Control Unit
Channel Command Word
Collision Detection
CD
Compact Disk
CDB
Command Descriptor Block
CDC
Century Date Change
CDDA
Compact Disk - Digital Audio
CDDI
Copper Data Distribution Interface
CDE
Common Desktop Environment
CDG
Compact Disk - Graphic
CDI
Compact Disk Interactive
CDMA
Code Division Multiple Access
CDPD
Cellular Digital Packet Data
CDR
CDROM
Copy Density Range
Compact Disk ROM
CDTV
Commodore Total Vision
CDXA
Copmact Disk eXtended Architecture
CEC
Commission of European Communities
CEFIC
Conseil Européen des Federations de
l'Industrie Chimique
CELP
Code Excited Linear Prediction
CEN
Comité Européen de Normalisation
CENELEC
Comité Européen de Normalisation
Electrotechnique
CEO
Comprehensive Electronic Office
CEPT
Conference Européenne des
Administrations des Postes et
des Telecommunications
CERN
Conseil Européen pour la Recherche
Nucléaire
CF
Call Forwarding
CF
Carry Flag
CF
Control Function
CFV
Call For Votes
CGA
Colour Graphics Adapter
CGI
Common Gateway Interface
CGI
Computer Graphics Interface
CGM
Computer Graphics Metafile
CHAP
Protocol
Challenge-Handshake Authentication
CHL-I
CHanneL Interface
CHPID
CI
CHannel Path IDentifier
Computer Interconnect
CI
Control Interval
CIAM
Computer Integrated and Automated
Manufacturing
CIB
CICS
Computer Integrated Business
Customer Information Control System
CID
Configuration, Installation and
Distribution
CIF
Cells In Frames
CIF
Common Intermediate Format
CIF
CIM
Computer Integrated Factory = CIO +
CIM
Computer Input by Microfilm
CIM
Computer Integrated Manufacturing =
PPS + CAE + CAM
CIO
Computer Integrated Office
CIR
Committed Information Rate
CIS
Card Information Structure
CISC
Complex (Complete) Instruction Set
Computer
CIT
Computer Integrated Telephony
CIV
Conversation Verb Interface
CKD
Count Key Data
CL
Core Image Library
CL
Connectionless
CLI
Call Level Interface
CLIM
Compaq/Lotus/Intel/Microsoft
CLNS
Connectionless Network Service
CM/2
Communication Manager / 2
CMC
Communication Management
Configuration
CMEA
Council for Mutual Economic
Assistance
CMIP
Protocol
Common Management Information
CMIS
Service
Common Management Information
CMOS
System
Cellular Management Operation
CMOS
Complimentary Metal Oxide
Semiconductor
CMOT
Common Management Information
Protocol (CMOT) Over TCP/IP
CMR
Communications Resource Manager
CMS
CMYK
CN
CNC
CNLP
Conversational Monitor System
Cyan, Magenta, Yellow, Black
Corporate Network
Computerized Numerical Control
Connectionless Network Protocol
CNM
Communication Network
Management
CNMA
Communication Network for
Manufacturing Applications
CNR
Carrier-to-Noise-Ratio
COBOL
COmmon Business Oriented
Language
COCOM
Coordinating Comittee on
Multilateral Export Controls
CODASYL
COnference on DAta SYstems
Languages
Codec
Coder/Decoder
COFF
Common Object File Format
COM
Common Object Model
COM
Computer Output on Microfilm
COMAL
COMmon Algorithmic Language
COMREG
CONS
Service
Communication Region
Connection-Oriented Network
CORBA
Common Object Request Broker
Architecture
COS
COSE
COSINE
Europe
COSS
CP
CP-SVR
Corporation for Open Systems
Common Open Software Environment
Cooperation for OSI Networking in
Cross Operating System Service
Control Program
Control Point to Server
CP/M
Control Program/Monitor (for
Microcomputer)
CPE
Customer Premises Equipment
CPI
Characters Per Inch
CPI
Common Programming Interface
CPI
Computer to PABX Interface
CPIC
Common Programming Interface for
Communications
CPL
Current Privilege Level
CPR
Computerized Patient Record
CPS
Characters Per Second
CPU
Central Processing Unit
CR
Carriage Return
CR
Communication Region
CRC
Cyclic Redundancy Check
CRJE
Conversational Remote Job Entry
CRS
Computer Reservation System
CRS
Configuration Report Server
CRT
Cathode Ray Tube
CS
Communications Server
CSA
Common System Area
CSC
Cross System Consistency
CSDN
Circuit Switched Data Network
CSECT
Control Section
CSI
CSLIP
Consolidated Software Inventory
Compressed SLIP
CSMA/CA
Carrier Sense Multiple Access with
Collision Avoidance
CSMA/CD
Carrier Sense Multiple Access with
Collision Detection
CSP
Control Sequence Prefix
CSP
Cross System Product
CSPDN
Network
Circuit Switched Public Data
CSS
Cascading Style Sheet
CST
Computer Supported Telephony
CSU
Channel Service Unit
CSU/DSU
Channel Service Unit / Data
Service Unit
CT
Continuous Tone
CT2T
Continuous Tone To Tape
CTC
Channel To Channel
CTC
CICS To CICS
CTS
Clear To Send
CTS
Conformance Test System
CTS-WAN
WAN
CU
CUA
Conformance Testing Services for
Control Unit
Common User Access
CUT
Control Unit Terminal
CVOL
Control VOLume
CWS
Coalition for Working Systems
D
D/A
DA
Digital/Analog
Desk Accessory
DAC
Digital Analog Converter
DAC
Dual Attachment Concentrator
DAI
Distributed Artificial Intelligence
DAM
Direct Access Method
DAP
Directory Access Protocol
DAP
Document Application Profile
DARPA
Defense Advanced Research
Projects Agency
DAS
DASD
Dual Attachment Station
Direct Access Storage Device
DAT
Digital Audio Tape
DAT
Dynamic Address Translation
DB
DBCS
Database
Double Byte Character Set
DBMS
DataBase Management System
DBRT
Directed Beam Refresh Terminal
DC
Data Cartridge
DC
Data Communication
DCA
DCAF
Document Content Architecture
Distributed Console Access Facility
DCB
Data Control Block
DCB
Disk Coprocessor Board
DCC
Diskette Controller Chip
DCE
Data Circuit terminating Equipment
DCE
Data Communications Equipment
DCE
Distributed Computing Environment
DCI
Display Control Interface
DCL
Digital Command Language
DCS
Desktop Color Separation
DCT
Destination Control Table
DCT
Discrete Cosine Transform
DD
Data Definition
DDCMP
Digital Data Communications
Message Protocol
DDCS
Distributed Database Connecion
Services/2
DDE
Dynamic Data Exchange
DDES
Digital Data Exchange Specifications
DDI
Device Driver Interface
DDK
Driver Development Kit
DDL
Data Definition Language
DDL
Document Description Language
DDM
Distributed Data Management
DDN
Defense Data Network
DDP
Distributed Data Processing
DDRM
interface
Device driver interface/Driver kernel
Reference Manual
DDS
Dataphone Digital Service
DDS
Decision Support System
DECT
Digital European Cordless Telephone
DECUS
Society
Digital Equipment Computer Users
DEL
Delete
DES
Data Encryption Standard
DF
DFC
Direction Flag
Distributed Coordination Function
DFDSS
Data Facility Data Set Services
DFHSM
Manager
Data Facility Hierarchical Storage
DFP
Data Facility Product
DFR
Document Filing and Retrival
DFS
Distributed File System
DFSMS
Data Facility Storage Management
Subsystem
DFSORT
DFT
Data Facility Sort
Distributed Function Terminal
DFWMAC
Distributed Foundation Wireless
Media Access Control
DHCP
DHTML
Dynamic Host Configuration Protocol
Dynamic HTML
DIA
Document Interchange Architecture
DIB
Data Input Bus
DIB
Device Independent Bitmap
DIFS
Distributed coordination function
InterFrame Space
DIMM
Dual Inline Memory Module
DIP
Dual Inline Package
DIS
Draft International Standard
DISSOS
Distributed Office Support System
DIT
Directory Information Tree
DKI
Driver Kernel Interface
DL
Data Length
DL
Directory Listing
DL/1
Data Language 1
DLBL
Disk Label
DLCI
Data Linc Connection Identifier
DLE
Data Link Escape
DLL
Dynamic Link Library
DLS
Device Level Selection
DLSE
Device Level Selection Enhanced
DLSw
Data Link Switching
DLUR
Dependent LU Requester
DLUR/S
DLUS
Dependent LU Requester / Server
Dependent LU Server
DMA
Direct Memory Access
DMCI
Direct Memory Communications
Interface
DMD
Directory Management Domain
DMI
Digital Multiplexed Interface
DML
Data(base) Manipulation Language
DMNL
DMP
DN
Direct Multi Network Link
Dot Matrix Printer
Distinguished Name
DNA
Digital Network Architecture
DNS
Domain Name Service
DOC
Display Operator Console
DOE
Distributed Objects Everywhere
DOMF
Facility
Distributed Object Management
DOS
Declaration Of Support
DOS
Disk Operating System
DOS/VS
Storage
Disk Operating System / Virtual
DOS/VSE
Disk Operating System / Virtual
Storage Extended
DP
Data Processing
DP
Draft Proposal
DPA
Document Printing Application
DPF
Data Private Facility
DPI
Dots Per Inch
DPL
Descriptor Privilege Level
DPMS
Display Power Management
Signaling
DPS
Dynamic Path Selection
DQDB
Distributed Queue Dual Bus
DRAM
Dynamic Random Access Memory
DRQ
Data ReQuest
DS
Digit Select
DS
Directory System
DSA
Directory System Agent
DSA
Distributed Systems Architecture
DSA
Dynamic Storage Area
DSF
Device Support Facility
DSL
Direct Swift Link
DSN
DataSetName
DSN
DSNL
DSOM
Distributed Systems Network
Direct Swift Network Link
Distributed System Object Model
DSP
Digital Signal Processor
DSP
Directory System Protocol
DSR
Data Set Ready
DSSI
Digital Storage Systems Interconnect
DSU
Data Service Unit
DTAM
Document Transfer, Access and
Manipulation
DTD
Document Type Definition
DTE
Data Terminal Equipment
DTI
(UK)
Department of Trade and Industry
DTP
DeskTop Publishing
DTR
Data Terminal Ready
DU
Data Unit
DUA
Directory User Agent
DUN
Dispatch Unit Number
DVI
Digital Video Interface
DVST
DXI
Direct View Bistable Storage
Data eXchange Interface
E
E1
2,048 Mbps
E3
34 Mbps
EARN
Network
European Academic and Research
EB
Error Bell
EB
bytes)
ExaByte (1,152,921,504,606846,976
EBAM
Memory
Electronic Beam-Addressable
EBCD
Extended Binary Coded Decimal
EBCDIC
Extended Binary Coded Decimal
Interchange Code
ECC
Error Checking and Correction
ECC
Error Correction Code
ECE
Economic Commission for Europe
ECF
Enhanced Connectivity Facility
ECITC
European Committee fo IT Testing
and Certification
ECKD
Extended Count-Key Data
ECMA
European Computer Manufacturers
Association
ECTUA
European Counsil for
Telecommunications Users Association
EDC
Enterprise Database Connectivity
EDF
Execution Diagnostic Facility
EDG
Electronic Dot Generation
EDI
Electronic Data Interchange
EDICON
EDI Community for the Construction
Industry (UK)
EDIF
Electronic Design Interchange Format
EDIFACT
Electronic Data Interchange For
Administration, Commerce and
Transport
EDIM
EDIMS
Electronic Data Interchange Message
EDI Messaging System
EDM
Engineering Data Management
EDP
Electronic Data Processing
EDR
Early Device Release
EEMA
European Electronic Mail Association
EFT
Electronic Funds Transfer
EGA
Enhanced Graphics Adapter
EGP
Exterior Gateway Protocol
EHLLAPI
Emulator High Level Language
Applications Programming Interface
EIB
Execute Interface Block
EIP
Execute Interface Program
EISA
Extended Industry Standard
Architecture
EIT
Encoding Information Type
EIUF
European ISDN User Forum
ELAN
European LAN
ELAN
Extended LAN
ELAN
Emulated LAN
EM
End of Medium
EMA
Enterprise Management Architecture
EMS
Expanded Memory Specification
EMUG
EN
ENE
European MAP Users Group
European Norme
Enterprise Network Event
ENP
Enable Presentation
ENQ
Enquiry
EO
Eight Ones
EOB
End of Block
EOC
End of Cylinder
EOF
End of File
EOJ
End of Job
EOP
End of Procedure
EOT
End of Transmission
EOV
End of Volume
EP
EPDE
Emulation Program
Electronic Product Data Exchange
EPOW
Emergency Power Off Warning
EPROM
Memory
Eraseable Programable Read Only
EPS
EPSF
ER
ERDS
Encapsulated PostScript
Encapsulated PostScript Format
Entity Relationship
Error Recording Data Set
EREP
Environmental Record Editing and
Printing program
ES
Errored Second
ESA
Extended Service Area
ESC
Escape
ESCON
Enterprise System Connection
Architecture
ESD
Electronic Software Distribution
ESD
External Symbol Dictionary
ESDI
Enhanced Small Device Interface
ESDS
Entry Sequenced Data Set
ESF
Extended SuperFrame
ESPRIT
European Strategic Programme for
Research and development in
Information Technology
ESQA
ETB
Extended System Queue Area
End of Transmission Block
ETCOM
European Testing and Certification
for Office and
Manufacturing protocols
ETS
European Telecommunication
Standard
ETSI
European Telecommunication
Standards Institute
ETX
End of Text
EUnet
European Unix Network
EUUG
European Unix User Group
EVI
EWOS
Systems
EXCP
EZ
EVent Information
European Workshop for Open
EXecute Channel Program
Excessive Zeros
F
F/STP
FA
Foil STP
Foreign Agent
FAQ
Frequently Asked Questions
FAST
Federation Against Software Theft
FAT
File Allocation Table
FBA
Fix Block Architecture
FBA
Fixed Blocked ANSI-defined printer
control characters
FBM
FC
Fix Block Modus
File Control
FCB
Format Control Buffer
FCP
File Control Program
FCS
Frame-Check Sequence
FCT
File Control Table
FDD
Fixed Disk Drive
FDDI
Fiber Distributed Data Interface
FEAL
Fast Data Encipherment Algorithm
FEP
Front-End Processor
FF
Formfeed
FH
Frame Handler
FIFO
First In, First Out
FIPS
Federal Information Processing
Standard
FLOPS
Floating-point operations per second
FMLI
Forms and Menu Language
Interpreter
FOB
FOND
Form Overlay Buffer
Font family descriptor
FORTRAN
FPU
FORmula TRANslator
Floating Point Unit
FRAD
Frame Relay Access Device
FROM
Factory ROM
FRU
Field Replaceable Unit
FS
Field Separator
FS
File Separator
FSB
Front Side Bus
FSF
Free Software Foundation
FSK
Frequency Shift Keying
FT
FTAM
Fault Tolerant
File Transfer and Access Method
FTP
File Transfer Protocol
FTP
Foil Twisted Pair
FTTC
Fibre To The Curb
FTTH
Fibre To The Home
FTTP
Fibre To The Building
FUP
Funktionsplan
G
GAL
GATF
GB
Global Address List
Graphic Arts Technical Foundation
GigaByte (1,073,741,824 bytes)
GCR
Group Coded Recording
GDG
Generation Data Group
GDS
Global Directory Service
GDT
Global Descriptor Table
GDTR
GE
GETVIS
Global Descriptor Table Register
Graphic Escape
GET VIrtual Storage
GID
Group ID
GIF
Graphics Interchange Format
GIS
Generalized Information System
GIX
Global Internet Exchange
GKS
Graphical Kernel System
GML
Generalized Markup Language
GOSIP
GP
GPIB
Government OSI Profile
General Protection
General-Purpose Interface Bus
GRS
Global Resource Serialization
GS
Group Separator
GTF
Generalized Trace Facility
GUI
Graphical User Interface
GUIP
people
GUUG
Graphical User Interface for Blind
German Unix User Group
H
H&J
Hyphenation and Justification
HA
Home Address
HA
Host Agent
HADA
High Availability Disk Array
HCL
Hue, Chroma, and Luminance
HDA
Head-Disk Assembl
HDBV
Host Data Base View
HDLC
High Level Data Link
Communications
HDSL
High-bit rate Digital Subscriber Loop
HDTV
High Definition TV
HE
High End (system)
HGC
Hercules Graphics Card
HIC
Host Interface Computer
HLL
High Level Language
HLS
Hue-Lightness-Saturation
HMD
Head-Mounted Display
HMMP
HyperMedia Management Protocol
HMMS
HyperMedia Management Schema
HPCL
Hewlett-Packard Control Language
HPFS
High Performance File System
HPGL
Hewlett-Packard Graphical Language
HPR
HR
HSB
HSELAN
HSI
HSLAN
High Performance Routing
Horizontal Rule
Hue-saturation-brightness
High Speed ELAN
Hue-Saturation-Intensity
High Speed LAN
HSSI
High Speed Serial Interface
HSV
Hue-Saturation-Value
HT
Horizontal Tab
HTML
Hypertext Markup Language
HTTP
Hypertext Transfer Protocol
Hz
Hertz
I
I-Net
Intranet
I/O
Input/Output
I/O
Input/Output
IA5
International Alphabet Five
IAB
Internet Activities Board
IC
Integrated Circuit
ICEM
Integrated Computer Engineering
and Manufacturing
ICMP
ID
Internet Control Message Protocol
Identifier
IDA
Indirect Data Addressing
IDA
Intelligent Drive Array
IDE
Integrated Drive Electronics
IDEA
International Data Encryption
Algorithm
IDL
Interfacce Definition Language
IDT
Interrupt Descriptor Table
IEC
InterExchange Carrier
IEEE
Institute of Electrical and Electronic
Engineers
IETF
IF
IFF
Internet Engineering Task Force
Interrupt Flag
Interchange File Format
IFIP
International Federation of
Information Processing
IFS
Interchange File Separator
IFS
InterFrame Space
IGES
Initial Graphics Exchange
Specification
IGMP
IGS
II
Internet Group Membership Protocol
Interchange Group Separator
Interactive Interface
IISP
Interim Interswitch Signaling
Protocol
IKT
Informatione- und
Kommunikationstechnik
ILC
InterLanguage Communication
IML
Initial Microcode Load
IMPL
Initial Microprogram Load
IMR
Interrupt Mask Registers
IMS
Information Management System
IMS/VS
Information Management System /
Virtual Storage
INP
Inhibit Presentation
INT
INTerrupt
IOC
ISDN Ordering Code
IOCP
Input/Output Configuration Program
IOCS
Input/Output Control System
IOGEN
IOPL
IOS
IP
IPL
IPM
Input/Output device GENeration
Input/Output Privilege Level
Input/Output Supervisor
Internet Protocol
Initial Program Load
InterPersonal Message
IPSE
Integrated Project Support
Environment
IPX
Internet Packet Exchange
IR
IRC
IRDS
System
Index Return
Internet Relay Chat
Information Resource Dictionary
IRQ
Interrupt ReQuest
IRS
Interchange Recors Separator
IS
Information System
IS
Intermediate System
IS
International Standard
ISA
Industry Standard Architecture
ISAM
Indexed Sequential Access Method
ISDN
Integrated Services Digital Network
ISFMS
System
Indexed Sequential File Management
ISMF
Facility
Interactive Storage Management
ISO
International Standardization
Organisation
ISO IEC
ISO International Electrotechnical
Commitee
ISODE
ISO Development Environment
ISP
ISPF
Facility
Internet Service Provider
Interactive System Produvtivity
ISPF/PDF
ISPF Program Development Facility
ISR
Information Storage and Retrieval
ISR
Intermediate Session Routing
ISSE
Intel SIMD Sreaming Extension
ISV
Independent Software Vendor
IT
ITB
ITLD
Indent Tab
Intermediate Transmission Block
International Top-Level Domain
ITRC
Information Technology
Requirements Council
ITU
International Comunication Union
(ehem. CCITT)
ITV
Interactive TeleVision
IUS
Interchange Unit Separator
IWS
Intelligent WorkStation
J
JCC
Job Control Command
JCL
Job Control Language
JCS
Job Control Statement
JCT
JES Control Table
JCT
Journal Control Table
JECL
Job Entry Control Language
JEIDA
Japan Electronics Industry
Development Association
JES
JPEG
Job Entry Subsystem
Joint Photographic Experts Group
K
K
KB
KBPS
Kilobyte
KiloByte (1,024 Bytes)
KiloBits Per Second
kHz
KiloHertz
KIP
Kinetics Internet Protocol
KIPS
KL
Kilo Instructions per second
Key Length
KOPS
Kilo Operations per second
KSDS
Key Sequenced Data Set
KVA
L
KiloVolt Ampere
L2F
Layer 2 Forwarding
L2TP
Layer 2 Tunneling Protocol
LAN
Local Area Network
LAPS
LAN Adapter Protocol Support
Program
LBL
Label
LCD
Liquid Crystal Display
LCS
Lotus Communication Server
LDAP
Protocol
Lightweight Directory Access
LDMF
Librarian Disc Master File
LDS
Linear Data Set
LDT
Local Descriptor Table
LE
Low End (system)
LEC
LAN Emulation Client
LEC
Local Exchange Carrier
LED
Light Emitting Diode
LF
Linefeed
LIC
Line Interface Computer
LIFO
Last In, First Out
LILO
Last In, Last Out
LILO
Linux Loader
LIM-EMS
LIOCS
Lotus Intel Microsoft EMS
Logical Input/Output Control System
LISP
List Programming
LLC2
Logical Link Control Layer 2
LOC
Lines Of Code
LOS
Local Operator System
LPI
Lines Per Inch
LRC
Longitudinal Redundancy Checking
LRU
Least Recently Used
LSD
Least Significant Digit
LSI
Large Scale Integration -> VLSI
LU
Logical Unit
LUB
Logical Unit Block
LUT
Look Up Table
LVT
Light Valve Technology
LW
Line Work
LZ
Lempel-Ziv
LZW
Lempel-Ziv-Welch
M
MAC
Media Access Control
MAN
Metropolitan Area Network
MAP
Maintenance Analysis Procedure
MAP
Manufacturing Automation Protocol
MAPI
Messaging Applications Programming
Interface
MB
MBCS
MBONE
MBPS
MegaByte (1,048,576 bytes)
Multiple Byte Character Set
Multicast Backbone
MegaBits Per Second
MCA
Micro Channel Architecture
MCBF
Mean Cycles Between Failures
MCCOI
Multimedia Communications
Community of Interest
MCGA
MultiColour Graphics Array
MCI
Media Control Interface
MD
Management Domain
MD5
Message Digest 5
MDA
Monochrome Display Adapter
MEB
Memory Expansion Board
MFA
Modify Field Attribute
MFC
Microsoft Foundation Classes
MFKS
Multifunktionales Konferenzsystem
MFLOPS
Million Floating-Point Operations
Per Second
MFM
Modified Frequency Modulation
MFV
Multi File Volume
MFWS
MGA
MH
MHS
MI
MIB
MultiFunction WorkStation
Monochrome Graphic Adapter
Mobile Host
Message Handling System
Multiple Inheritance
Management Information Database
MICR
Magnetic Ink Character Reader
MIDI
Musical Instrument Digital Interface
MIME
Multipurpose Internet Mail
Extensions
MIPS
Millions of Instructions Per Second
MISC
Minimum Instruction Set Computer > CISC, RISC
MLPPP
MultiLink PPP
MMDF
Multi-Channel Memorandum
Distribution Facility
MMDS
Multi-Megabit Data Services
MMFS
Manufacturing Manage Format
Standard
MMX
Multi Media eXtensions
MNP
Microcom Network Protocol
MODEM
MOdulator/DEModulator
MOPS
Mega Operations per second
MOTIS
Systems
Message-Oriented Text Interchange
MP
MPC
MPEG
Multiprocessing
Multimedia PC
Motion Picture Experts Group
MPOA
MultiProtocol Over Asynchronous
transfer mode
MPSD
MPX
MultiPath Storage Director
multiplex
MS
MS-DOS
Message Store
Microsoft Disk Operating System
MSA
Metropolitan Statistical Area
MSD
Most Significant Digit
MSG
Message
MSM
MultiSession Monitor
MSW
Machine Status Word
MTA
Message Transfer Agent
MTBF
MeanTime Between Failures
MTDA
Mean Time Data Availability
MTS
Message Transfer System
MUD
Multi-User Dungeon
MULTICS
MULTiplexed Information and
Computing Service
MUMPS
Massachusetts General Hospital
Utility Multi-Programmings System
MUMPS
Multi-User MultiProgrammingSystem
MVS
Multiple Virtual System
MVS/ESA
Multiple Virtual System / Extended
System Architecture
MVS/XA
Multiple Virtual System / Extended
Architecture
MVSCP
MVS Configuration Program
N
NAC
Network Adapter Card
NAK
Negative Acknowledgement
NAP
Network Access Point
NAS
Network Access Server
NAT
Network Address Translation
NAU
Network Addressable Unit
NBS
National Bureau of Standards
NBS
Numeric BackSpace
NC
NCCF
Facility
Numeric Control
Network Communication Control
NCP
Network Control Processor
NCP
Network Control Program
NCP/VS
Storage
Network Control Program/Virtual
NDIS
Network Driver Interface
Specification
NetSP
Network Security Program
NFNT
New font numbering table
NFS
NHRP
Network File System
Next Hop Routing Protocol
NIC
Network Interface Card
NIC
Network Information Center
NIS
Network Information Service
NIST
National Institute for Standards and
Technology
NJE
Network Job Entry
NL
New Line
NLQ
Near Letter Quality
NLT
Nucleus Load Table
NMI
NonMaskable Interrupt
NNTP
NSA
NSC1
Network News Transport Protocol
National Security Agency
Network Systems Cypher One
NSP
Numeric Space
NSS
NATURAL Security-System
NT
Network Termination
NTS/2
Network Transport Services/2
NTSC
National Television System
Committee
NUI
Network User Identification
NUL
Null
NUMA
Non-Uniform Memory Access
NVOD
Near Video On Demand
NVRAM
NVS
NonVolatile Random Access Memory
NonVolatile Storage
O
O/R
Originator / Recipient
OC3
155 Mbit/s
OCR
Optical Character Recognition
OCX
OLE Control Extension
ODA
Open Document Architecture
ODSI
Open Directory Service Interfaces
OEM
Original Equipment Manufacturer
OI
OLE
OLTEP
Object Interface
Object Linking and Embedding
On-Line Test Executive Program
OLTP
On-Line Transaction Processing
OMG
Object Management Group
OMR
Optical Mark Recognition
OO
OOA
OODBMS
OOP
Objektorientierung
Objektorientierte Analyse
Object Oriented DBMS
Objektorientierte Programmierung
OOPL
Object Oriented Programming
Language
OOPS
System
Object Oriented Programming
OP
Operator Panel
OPI
Open Prepress Interface
ORB
Object Request Broker
OS
Operating System
OS/2
Operating System/2
OSA
Office Systems Architecture
OSA
Open System Architecture
OSF
Open Software Foundation
OSI
Open Systems Interconnection
OSI/RM
OSI Reference Model
OSNS
Open Systems Network Support
OSPF
Open Shortest Path First
OSTC
Open System Testing Consortium
OTPROM
OWL
One Time Programable ROM
Object Windows Library
P
PABX
Private Automatic Branch Exchange
PAD
Packet Assembly Disassembly
PAL
Phase Alternating Line
PAL
Programmable Array Logic
PAM
Partitioned Access Method
PAP
Password Authentication Protocol
PB
bytes)
PBX
PetaByte (1,125,899,906,842,624
Private Branch Exchange
PC
Personal Computer
PC
Personal Computing
PC
Program Control
PCB
Printed Circuit Board
PCB
Program Control Block
PCI
Peripheral Component Interface
PCI
Program Controlled Interuption
PCIL
Private Core Image Library
PCL
Printer Control Language
PCM
Plug Compatible Manufacturers
PCMCIA
Personal Computer Memory Card
International Association
PCN
Personal Communication Network
PCP
Program Control Program
PCS
Personal Communication Services
PCT
Private Communication Technology
PCT
Program Control Table
PD
Public Domain
PDA
Personal Digital Assistant
PDAD
Proposed Draft Addendum
PDAU
Physical Data Access Unit
PDF
Program Development Facility
PDL
Page Description Language
PDO
Portable Distributed Objects
PDS
Partitioned Data Set
PDS
Premise Distribution System
PDS
Processor Direct Slot
PDU
Protocol Data Unit
PDX
Printer Description Extension
PE
Printer's error
PE
Protection Enabled
PEARL
Processor and Experiment
Automation Realtime Language
PEM
Privacy Enhanced Mail
PEP
Partitioned Emulation Program
PER
Program Event Recording
PERL
Practical Extraction and Report
language
PF
Parity Flag
PFK
Program Function Key(board)
PFM
Printer Font Metric
PGA
Professional graphics adapter
PGP
Pretty Good Privacy
PIB
Program Information Block
PID
Process ID
PIFS
Point InterFrame Space
PIM
Personal Information Management
PIN
Personal Identification Number
PIOCS
System
PL
PL/1
PLI
PLPA
Physical Input/Output Control
Procedure Library
Programming Language 1
Programming Language 1
Pageable Link Pack Area
PLT
Program List Table
PLU
Primary Logical Unit
PMMU
Paged memory management unit
PMS
Pantone Matching System
PMS
Project Management System
PMT
Photomechanical Transfer (photostat)
PMT
Photomultiplier Tube
PNNI
Private Network-to-Network
Interface
POC
Program-Operator Communication
POP
Point Of Presence
POP
Post Office Protocol
POSIX
for UNIX
Portable Operating System Interface
POTS
Plain Old Telephone System
POWER
Priority Output Writer, Execution
processors and input Readers
PP
PPD
Presentation Position
PostScript Printer Description
PPGA
Plastic Pin Grid Array
PPM
Pages Per Minute
PPP
Point-to-Point Protocol
PPT
Processing Program Table
PPTP
PPV
PRDMD
Domain
PRL
Point-to-Point Tunneling Protocol
Pay Per View
Private Directory Management
Private Relocatable Library
PRMD
Private Management Domain
PROM
Programable Read Only Memory
PSB
Program Specification Block
PSDN
PSRAM
Packet Swiched Data Network
Pseudo SRAM
PSSL
Private Source Statement Library
PSTN
Public Swiched Telephone Network
PSW
Program Status Word
PTF
Program Temporary Fix
PTR
PoinTeR
PU
Physical Unit
PUB
Physical Unit Block
PVC
Permanent Virtual Circuit
PVP
Packet Video Processor
PWB
Printed Wire Board
PWS
Programmable WorkStation
Q
QAM
Quadrature Amplitude Modulation
QBE
Query By Example
QCIF
Quater Common Intermediate Format
QIC
QSAM
Quarter-Inch Cartridge
Queued Sequential Access Method
QTAM
Method
Queued Teleprocessing Access
R
R0
Record zero
RACF
Resource Access Control Facility
RAID
Disks
Redundant Array of Inexpensive
RAID
Disks
Redundant Array of Independent
RAM
Random Access Memory
RARP
Reverse Address Resolution Protocol
RBA
RC
Relative Byte Adresse
Robot Control
RCP
Remote Communication Processor
RCS
Revision Control System
RDA
Remote Data Access
RDBMS
System
Relational DataBase Management
RDN
Relative Distinguished Name
RES
Restore
RF
Resume Flag
RFC
Request For Comments
RFF
Required Form Feed
RFS
Remote File System
RGB
Red, Green, Blue
RGM
Red, Green, Blue (Monitor)
RIFF
Resource Interchange File Format
RIP
Raster Image Processor
RIP
Router Information Protocol
RISC
Reduced Instruction Set Computer
RJE
Remote Job Entry
RL
Relocatable Library
RLD
Relocation Dictionary
RLE
Run Length Encoded file
RLL
Run Length Limited
RMF
Resource Management Facility
RNL
Required New Line
ROM
Read Only Memory
RPC
Remote Procedure Call
RPG
Report Program Generator
RPL
Requestor's Privilege Level
RPL
Research Programming Language
RPM
Revolutions Per Minute
RPS
Rotational Position Sensing
RPT
Repeat
RRDS
Relative Record Data Set
RRED
Right Reading Emulsion Down
RREU
Right Reading Emulsion Up
RS
RSP
RSVP
RTC
RTCP
RTF
RTM/SF
RTP
RTSE
RWSI
S
Record Separator
Required Space
Resource Reservation Protocol
Real Time Clock
Realtime Transport Control Protocol
Rich Text Format
Realtime Monitor / Systems Facility
Realtime Transport Protocol
Reliable Transfer Service Element
Remote Workstation Interface
S.W.I.F.T. Society for Worldwide Interbank
Financial Telecommunication
S/STP
SA
Shielded STP
Set Attribute
SAA
Storage Accounting Area
SAA
System Application Architecture
SAM
Sequential Access Method
SAP
Service Access Point
SAP
Service Advertising Protocol
SAR
Segmentation And Reassembly
SBCS
SBS
SC
SCA
Single Byte Character Set
Subscript
Storage Control
Shared Control Array
SCCS
Source Code Control System
SCDS
Source Control Data Set
SCI
Scalable Coherent Interconnect
SCODL
Scanned Conversion Object
Description Language
SCP
Storage Control Program
SCP
SCRAM
Memory
System Control Program
Static Column Random Access
SCSI
Small Computer Systems Interface
SDH
Synchronous Digital Hierarchy
SDK
Software Development Kit
SDL
System Directory List
SDLC
SDRAM
SDSF
Synchronous Data Link Control
Synchronous DRAM
System Display and Search Facility
SE
Software Entwicklung
SE
System Engineer
SECC
SECAM
SEL
SEPP
SET
Single Edge Contact Connector
Sequential Couleur a'Memorie
Select
Single Edge Processor Package
Software-Engineering-Technology
SF
Sign Flag
SF
Support Facility
SFA
Salesforce Automation
SFBI
Shared Frame Buffer Interconnect
SFE
Start Field Extended
SFT
System Fault Tolerance
SFTP
Shielded Foil Twisted Pair
SGML
Standard Generalized Markup
Language
SHTTP
SHY
Secure HTTP
Syllable Hyphen
SI
Shift In
SI
Single Inheritance
SI
Standard Interface
SIFS
Short InterFrame Space
SIFT
Stanford Information Filtering Tool
SIG
Special Interest Group
SIM
Service Information Message
SIMD
Single Instruction Multiple Data
SIMM
Single In-line Memory Module
SIRDS
Single Image Random Dot
Stereogram
SIT
System Initialization Table
SL
SLD
Source Statement Library
Structured Logic Design
SLED
Single Large Expensive Disk
SLIP
Serial Line Internet Protocol
SLR
Service Level Reporter
SLU
Secondary Logical Unit
SM
Set Mode
SMDS
Switched Multimegabit Data Service
SMF
System Management Facility
SML
MVS Storage Management Library
SMLI
Stateful MultiLayer Inspection
SMP
Symetric MultiProcessing
SMP
System Modification Program
SMS
Storage Management Subsystem
SMTP
SNA
Simple Mail Transfer Protocol
System Network Architecture
SNADS
SNA Distribution Services
SNMP
Protocol
Simple Network Management
SNOBOL
String Oriented Symbolic Language
SNT
SO
Sign-On Table
Shift Out
SOD
Service On Demand
SOH
Start Of Heading
SOM
System Object Model
SOS
Start Of Significance
SP
SPA
Space
Software Publishers Association
SPARC
Scalar Processor ARChitecture
SPDU
Session Protocol Data Unit
SPM
SPOOL
On Line
System Performance Monitor/2
Simultaneous Peripheral Operations
SPP
Scalable Parallel Processing
SPS
Superscript
SPX
Sequenced Packet eXchange
SQL
Structured Query Language
SQL/DS
System
SRAM
Structured Query Language / Data
Static Random Access Memory
SRT
System Recovery Table
SRU
Shared Resource Unit
SS
Single Sided
SS
Stack Segment
SSCP
System Service Control Point
SSID
SubSystem IDentifier
SSL
Secure Socket Layer
STM
Synchronous Transfer Mode
STP
Shielded Twisted Pair
STT
Secure Transaction Technology
STX
Start of Text
SUB
Substitute
SV
Storage Violation
SVA
Shared Virtual Area
SVC
Supervisor Call
SVC
Switched Virtual Circuit
SVGA
SW
SWOP
Printing
Super-VGA
Switch
Specifications for Web Offset
SYN
SYSOP
Synchronous Idle
System Operator
T
T1
1.544 Mbit/s
T3
45 Mbit/s
TARGA
Truevision Advanced Raster
Graphics Adapter
TB
TeraByte (1,099,511,627,776 bytes)
TC
Terminal Control
TCA
TCAM
Task Control Area
Telecommunications Access Method
TCB
Task Control Block
TCL
Tool Command Language
TCM
Thermal Conduction Module
TCO
Triple Capacity Option
TCP
Terminal Control Program
TCP
Transmission Control Protocol
TCP/IP
Transmission Control
Protocol/Internet Protocol
TCT
Terminal Control Table
TCTTE
Entry
TCU
TD
Terminal Control Table Terminal
Transmission Control Unit
Transient Data
TDIA
Transient Data Input Area
TDM
Time-Division Multiplexing
TDOA
Transient Data Output Area
TDP
Transient Data Program
TEO
Technical Electronic Office
TF
Trap Flag
TIC
Technical Integrity Check
TIFF
Tagged Image File Format
TIOA
Terminal Input/Output Area
TLB
Translation Lookaside Buffer
TLBL
Tape Label
TMO
Thermo-Magneto-Optic technology
TNEF
Format
Transport-Neutral Encapsulation
TOC
Table Of Contents
TOP
Technical Office Protocol
TPDU
Transport Protocol Data Unit
TPF
Transaction Processing Facility
TPI
Tracks Per Inch
TPM
Third-Party Maintenance
TPS
Transactions Per Second
TRN
Transparent
TS
Telecommunication System
TS
Temporary Storage
TSIOA
Area
Temporary Storage Input/Output
TSO
Time Sharing Option
TSP
Temporary Storage Program
TSR
Terminate and Stay Resident
TTA
Teletex Attachment (Teletexzusatz)
TTL
Transistor Transistor Logic
TTR
Track Record
TTY
TeleTYpe
TWA
Transaction Work Area
TWA
Two-Way Alternate
TWS
Two-Way Simultaneous
TX
TXT
Telex
Text
U
UA
UAE
User Agent
Unrecoverable Application error
UART
Universal Asynchronous
Receiver/Transmitter
UBR
Undefined Bit Rate
UBS
Unit Backspace
UCB
Unit Control Block
UCR
Undercolor removal
UCS
Universal Character Set
UCSB
Universal Character Set Buffer
UCW
Unit Control Word
UDP
User Datagram Protocol
UI
UID
User Interface
User ID
UMB
Upper Memory Block
UNC
Universal Naming Convention
UNC
Universal Network Convention
UPC
Universal Product Code
UPS
Uninterruptible Power Supply
UPSI
User Program Switch Indicator
UR
Unit Record
URL
Uniform Resource Locator
US
Unit Separator
USART
Universal
Synchronous/Asynchronous
Receiver/Transmitter
USENET
USM
USEr NETwork
UnSharp Masking
USRT
Universal Synchronous
Receiver/Transmitter
USV
Unterbrechungsfreie
StromVersorgung
UTP
UUCP
Unshielded Twisted Pair
Unix-to-Unix Copy Program
V
VAD
Value Added Dealer
VAN
Value Added Network
VAP
Value Added Process
VAR
Value Added Reseller
VAST
Virtual Archive Storage Technology
VB
Visual Basic
VBA
Visual Basic for Applications
VBR
Variable Bit Rate
VBN
Vermitteltes Breitbandnetz
VC
Virtual Circuit
VC-SDRAM
Virtual Channel SDRAM
VCC
Virtual Circuit Connection
VCI
Virtual Circuit Identifier
VCNA
Vtam Communication Network
Application
VCPI
VDAC
Virtual Control Program Interface
Video Digital Analog Converter
VDI
Video Display Interface
VDT
Video Display Terminal
VDU
Visual Display Unit
VERONICA Very Easy Rodent-Oriented
Netwide Index to Computerized Archives
VGA
Video Graphics Array
VGC
Video Graphics Controller
VGM
Video Graphics Monitor
VHDSL
Loop
Very High-bit rate Digital Subscriber
VHLL
Very High-Level Language
VHS
Video Home System
VIO
Video Input/Output
VIO
Virtual Input/Output
VIPA
Virtual IP Addressing
VLAN
Virtual LAN
VLSI
Very Large Scale Integration
VM
Virtual Machine
VM/SP
VMMAP
Virtual Machine / System Product
VM Monitor Analysis Program
VMOS
Vertical MOS
VMPPF
VM Performance Planning Facility
VMPRF
VM Performance Reporting Facility
VMS
Virtual Management System
VOD
Video On Demand
VPD
Vital Product Data
VPDN
VPI
VPN
VR
Virtual Private Data Network
Virtual Path Identifier
Virtual Private Network
Virtual Reality
VRAM
Video RAM
VRML
Virtual Reality Modeling Language
VRC
VS
Vertical Redundancy Checking
Virtual Storage
VSAM
Virtual Storage Access Method
VSAT
Very Small Aperture Terminal
VSM
Virtual Storage Management
VSN
Volume Serial Number
VT
Vertical Tab
VTAM
Method
Virtual Telecommunications Access
VTOC
Volume Table of Contents
VTP
Virtual Terminal Protocol
VTP
Virtual Terminal Program
VTX
VideoTeXt
VVDS
VSAM Volume Data Set
W
W3
W4WG
World Wide Web
Windows for Workgroups
WABI
Windows Application Binary
Interface
WAIS
Wide Area Information Service
WAN
Wide Area Network
WATM
Wireless ATM
WATS
Service
Wide Area Telecommunications
WHAT
bounded
Wireless Hybrid Asynchronous Time-
WIMP
Windows, Icons, Mice and Pointers
WINS
Windows Internet Name Service
WMAC
Wireless Media Access Control
WMF
WORM
Windows metafile
Write Once, Read Many times
WOSA
Windows Open Services/Systems
Architecture
WRED
Wrong Reading Emulsion Down
WREU
Wrong Reading Emulsion Up
WS
WorkStation
WTO
Write To Operator
WUS
Word Underscore
WWW
World Wide Web
WXTRN
Weak External Reference
WYSIWYG
What You See Is What You Get
X
XA
EXtended Architecture
XIP
Execute In Place
XLT
Transaction List Table
XMS
XT
Extended Memory Specification
eXtended Technology
Y
Y2K
Year 2000
YIQ
space)
(color components in NTSC color
YUV
(color components in SECAM and PAL
color spaces)
Z
ZBR
Zero Bug Release
ZD
Zero Defects
ZF
Zero Flag
Download